CN112600811A - Tr069 protocol-based automatic authorization CPE method and system - Google Patents

Tr069 protocol-based automatic authorization CPE method and system Download PDF

Info

Publication number
CN112600811A
CN112600811A CN202011417745.XA CN202011417745A CN112600811A CN 112600811 A CN112600811 A CN 112600811A CN 202011417745 A CN202011417745 A CN 202011417745A CN 112600811 A CN112600811 A CN 112600811A
Authority
CN
China
Prior art keywords
secret key
identification information
equipment
acs
protocol
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011417745.XA
Other languages
Chinese (zh)
Other versions
CN112600811B (en
Inventor
罗祥吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou V Solution Telecommunication Technology Co ltd
Original Assignee
Guangzhou V Solution Telecommunication Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou V Solution Telecommunication Technology Co ltd filed Critical Guangzhou V Solution Telecommunication Technology Co ltd
Priority to CN202011417745.XA priority Critical patent/CN112600811B/en
Publication of CN112600811A publication Critical patent/CN112600811A/en
Application granted granted Critical
Publication of CN112600811B publication Critical patent/CN112600811B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Power Engineering (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a method and a system for automatically authorizing a CPE based on a tr069 protocol, which comprises the following steps: an automatic configuration server ACS receives a first secret key generated by a client front-end device according to a preset secret key generation method and device identification information; the ACS acquires the equipment identification information from the first secret key and generates a second secret key according to the preset secret key generation method and the equipment identification information; and if the character strings of the first secret key and the second secret key are consistent, allowing the customer premises equipment to access. The automatic configuration server authorizes the access of the client front-end equipment in the mode, so that the danger that a user name and a password are stolen can be prevented. And the security of KEY is improved by adding the SN serial number encryption mode and the suffix. By comparing the KEY authorization mode, the method is quick and efficient, and the efficiency of accessing large-scale customer premises equipment is remarkably improved.

Description

Tr069 protocol-based automatic authorization CPE method and system
Technical Field
The embodiment of the application relates to the technical field of Customer Premises Equipment (CPE) management, in particular to a method and a system for automatically authorizing a CPE based on a tr069 protocol.
Background
The customer premises equipment is the basic condition of network communication, and more customer premises equipment are accessed into the network, and play a very important role in the normal communication and the safe communication of the network. The management of the client front-end device must rely on an Auto-Configuration Server (ACS), which manages the client front-end device on the premise that the client front-end device is verified first. The client front-end equipment which is generally accessed to the automatic configuration server through the TR069 protocol carries out access authority authentication through reporting a user name and a password. The method is easy to intercept and obtain the correct user name and password in the network packet communication process, so that the illegal client front-end equipment can access the automatic configuration server.
Disclosure of Invention
The embodiment of the application mainly aims to provide an automatic authorization CPE method and system based on a tr069 protocol, and solves the problem that in the prior art, correct user names and passwords are intercepted and obtained in a network packet communication process, so that an illegal client front-end device accesses an automatic configuration server.
In order to solve the above problem, in a first aspect, an embodiment of the present invention provides an automatic CPE authorization method based on a tr069 protocol, which is applied to an automatic configuration server ACS, and includes:
an automatic configuration server ACS receives a first secret key generated by a client front-end device according to a preset secret key generation method and device identification information;
the ACS acquires the equipment identification information from the first secret key and generates a second secret key according to the preset secret key generation method and the equipment identification information;
and if the character strings of the first secret key and the second secret key are consistent, allowing the customer premises equipment to access.
Preferably, the device identification information is a product serial number SN of the customer premises equipment.
Preferably, the preset key generating method includes:
reinforcing a fixed suffix onu _ SN _ itml of the product serial number SN to form a to-be-encrypted character string of SN + onu _ SN _ itml;
and encrypting the character string to be encrypted according to a base64 encoding algorithm and an md5 information digest algorithm.
Preferably, the ACS receives, in an info message manner, a first key generated by the client front-end device according to the preset key generation method and the device identification information.
Preferably, the method further comprises the following steps:
and if the character strings of the first secret key and the second secret key are not consistent, allowing the customer premises equipment to access.
In a second aspect, an embodiment of the present invention provides an automatic CPE authorization method based on a tr069 protocol, which is applied to a customer premises equipment, and includes:
the method comprises the steps that a client front-end device generates a first secret key according to a preset secret key generation method and device identification information, sends the first secret key to an Automatic Configuration Server (ACS) so that the ACS can obtain the device identification information from the first secret key, and generates a second secret key according to the preset secret key generation method and the device identification information;
and the client front-end equipment acquires the access authority when the ACS judges that the character strings of the first secret key and the second secret key are consistent.
Preferably, the automatic authorization CPE method based on tr069 protocol as claimed in claim 6, wherein the device identification information is a product serial number SN of the customer premises equipment, and the preset key generating method includes:
reinforcing a fixed suffix onu _ SN _ itml of the product serial number SN to form a to-be-encrypted character string of SN + onu _ SN _ itml;
and encrypting the character string to be encrypted according to a base64 encoding algorithm and an md5 information digest algorithm.
In a third aspect, an embodiment of the present invention provides an automatic authorization CPE system based on a tr069 protocol, which is applied to an automatic configuration server ACS, and includes:
the receiving module is used for receiving a first secret key generated by the client front-end equipment according to a preset secret key generation method and equipment identification information by the automatic configuration server ACS;
the ACS acquires the equipment identification information from the first secret key and generates a second secret key according to the preset secret key generation method and the equipment identification information;
and the authorization module is used for allowing the customer premise equipment to access if the character strings of the first secret key and the second secret key are consistent.
In a fourth aspect, an embodiment of the present invention provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the computer program to implement the steps of the tr069 protocol-based automatic authorization CPE method according to the first or second aspect of the present invention.
In a fifth aspect, an embodiment of the present invention provides a non-transitory computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the tr069 protocol-based automatic authorization CPE method according to the first or second aspect of the present invention.
The embodiment of the invention provides a method and a system for automatically authorizing a CPE (customer premises equipment) based on a tr069 protocol, wherein an automatic configuration server authorizes the access of customer premises equipment in the above mode, so that on one hand, the danger that a user name and a password are stolen can be prevented. And the security of KEY is improved by adding the SN serial number encryption mode and the suffix. By comparing the KEY authorization mode, the method is quick and efficient, and the efficiency of accessing large-scale customer premises equipment is remarkably improved.
Drawings
One or more embodiments are illustrated by way of example in the accompanying drawings, which correspond to the figures in which like reference numerals refer to similar elements and which are not to scale unless otherwise specified.
Fig. 1 is a flowchart of an automatic CPE authorization method based on tr069 protocol according to an embodiment of the present invention;
fig. 2 is a schematic diagram of a server according to another embodiment of the present invention.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the embodiments of the present application will be described in detail below with reference to the accompanying drawings. However, it will be appreciated by those of ordinary skill in the art that in the examples of the present application, numerous technical details are set forth in order to provide a better understanding of the present application. However, the technical solution claimed in the present application can be implemented without these technical details and various changes and modifications based on the following embodiments. The following embodiments are divided for convenience of description, and should not constitute any limitation to the specific implementation manner of the present application, and the embodiments may be mutually incorporated and referred to without contradiction.
In the embodiment of the present application, the term "and/or" is only one kind of association relationship describing an associated object, and means that three relationships may exist, for example, a and/or B may mean: a exists alone, A and B exist simultaneously, and B exists alone.
The terms "first" and "second" in the embodiments of the present application are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present application, the terms "comprise" and "have", as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a system, product or apparatus that comprises a list of elements or components is not limited to only those elements or components but may alternatively include other elements or components not expressly listed or inherent to such product or apparatus. In the description of the present application, "plurality" means at least two, e.g., two, three, etc., unless explicitly specifically limited otherwise.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
The client front-end equipment accessing the automatic configuration server through the TR069 protocol carries out access authority authentication by reporting a user name and a password. The method is easy to intercept and obtain the correct user name and password in the network packet communication process, so that the illegal client front-end equipment can access the automatic configuration server.
Therefore, the embodiment of the invention provides an automatic authorization method and system for CPE based on tr069 protocol, and the automatic configuration server authorizes the access of the customer premises equipment through the above mode, so that on one hand, the danger that a user name and a password are stolen can be prevented. And the security of KEY is improved by adding the SN serial number encryption mode and the suffix. By comparing the KEY authorization mode, the method is quick and efficient, and the efficiency of accessing large-scale customer premises equipment is remarkably improved. The following description and description will proceed with reference being made to various embodiments.
Fig. 1 is a method for automatically authorizing a CPE based on a tr069 protocol according to an embodiment of the present invention, including:
an automatic configuration server ACS receives a first secret key generated by Customer Premises Equipment (CPE) according to a preset secret key generation method and Equipment identification information;
the ACS acquires the equipment identification information from the first secret key and generates a second secret key according to the preset secret key generation method and the equipment identification information;
and if the character strings of the first secret key and the second secret key are consistent, allowing the customer premises equipment to access.
Specifically, the CPE generates a KEY from the SN serial number of the equipment according to a self-defined KEY generation mode, and reports the KEY to the ACS through an in-form mode;
the ACS compiles an encryption function which is the same as that of the CPE, acquires an SN serial number of the equipment in a package of the equipment in, and generates a KEY by using the SN serial number;
the CPE reports the KEY generated by the S1 to the ACS through the info, the ACS receives the info packet, the SN serial number of the equipment is obtained, the KEY is generated through the S2 method, then the KEY reported by the CPE is compared with the KEY generated by the ACS according to the SN serial number of the CPE, if the KEY character strings are consistent, authorization is successful, the equipment is accessed to the system (ACS) for management, otherwise, if the KEY character strings are not consistent, the system (ACS) prohibits the access of the CPE equipment.
On the basis of the above embodiment, as a preferred implementation manner, the device identification information is a product serial number SN of the customer premises equipment.
On the basis of the foregoing embodiment, as a preferred implementation, the preset key generating method includes:
reinforcing a fixed suffix onu _ SN _ itml of the product serial number SN to form a to-be-encrypted character string of SN + onu _ SN _ itml;
and encrypting the character string to be encrypted according to a base64 encoding algorithm and an md5 information digest algorithm.
On the basis of the foregoing embodiment, as a preferred implementation manner, the ACS receives, in an form of an info message, a first key generated by the client front-end device according to the preset key generation method and the device identification information.
Reinforcing the SN serial number from the equipment in form with a fixed suffix 'onu _ SN _ itml' to form a character string SN + 'onu _ SN _ itml', combining the suffix character string with base64 to realize md5 encryption, and returning a result to be KEY after the SN serial number is encrypted.
In a second aspect, an embodiment of the present invention provides an automatic CPE authorization method based on a tr069 protocol, which is applied to a customer premises equipment, and includes:
the method comprises the steps that a client front-end device generates a first secret key according to a preset secret key generation method and device identification information, sends the first secret key to an Automatic Configuration Server (ACS) so that the ACS can obtain the device identification information from the first secret key, and generates a second secret key according to the preset secret key generation method and the device identification information;
and the client front-end equipment acquires the access authority when the ACS judges that the character strings of the first secret key and the second secret key are consistent.
The ACS compiles an encryption function which is the same as that of the CPE, acquires an SN serial number of the equipment in a package of the equipment in, and generates a KEY by using the SN serial number;
the CPE reports the KEY generated by the S1 to the ACS through the info, the ACS receives the info packet, the SN serial number of the equipment is obtained, the KEY is generated through the S2 method, then the KEY reported by the CPE is compared with the KEY generated by the ACS according to the SN serial number of the CPE, if the KEY character strings are consistent, authorization is successful, the equipment is accessed to the system (ACS) for management, otherwise, if the KEY character strings are not consistent, the system (ACS) prohibits the access of the CPE equipment.
On the basis of the foregoing embodiment, as a preferred implementation manner, the device identification information is a product serial number SN of the customer premises equipment, and the preset key generating method includes:
reinforcing a fixed suffix onu _ SN _ itml of the product serial number SN to form a to-be-encrypted character string of SN + onu _ SN _ itml;
and encrypting the character string to be encrypted according to a base64 encoding algorithm and an md5 information digest algorithm.
In a third aspect, an embodiment of the present invention provides an automatic authorization CPE system based on a tr069 protocol, where the automatic authorization CPE method based on a tr069 protocol in the foregoing embodiments is applied to an automatic configuration server ACS, and includes:
the receiving module is used for receiving a first secret key generated by the client front-end equipment according to a preset secret key generation method and equipment identification information by the automatic configuration server ACS;
the ACS acquires the equipment identification information from the first secret key and generates a second secret key according to the preset secret key generation method and the equipment identification information;
and the authorization module is used for allowing the customer premise equipment to access if the character strings of the first secret key and the second secret key are consistent.
The ACS compiles an encryption function which is the same as that of the CPE, acquires an SN serial number of the equipment in a package of the equipment in, and generates a KEY by using the SN serial number;
the CPE reports the KEY generated by the S1 to the ACS through the info, the ACS receives the info packet, the SN serial number of the equipment is obtained, the KEY is generated through the S2 method, then the KEY reported by the CPE is compared with the KEY generated by the ACS according to the SN serial number of the CPE, if the KEY character strings are consistent, authorization is successful, the equipment is accessed to the system (ACS) for management, otherwise, if the KEY character strings are not consistent, the system (ACS) prohibits the access of the CPE equipment.
Based on the same concept, an embodiment of the present invention further provides a schematic diagram of a server, as shown in fig. 2, the server may include: a processor (processor)810, a communication Interface 820, a memory 830 and a communication bus 840, wherein the processor 810, the communication Interface 820 and the memory 830 communicate with each other via the communication bus 840. The processor 810 may invoke logic instructions in the memory 830 to perform the steps of the tr069 protocol based auto-authorization CPE method as described in the various embodiments above. Examples include:
an automatic configuration server ACS receives a first secret key generated by a client front-end device according to a preset secret key generation method and device identification information;
the ACS acquires the equipment identification information from the first secret key and generates a second secret key according to the preset secret key generation method and the equipment identification information;
and if the character strings of the first secret key and the second secret key are consistent, allowing the customer premises equipment to access.
In addition, the logic instructions in the memory 830 may be implemented in software functional units and stored in a computer readable storage medium when the logic instructions are sold or used as independent products. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a client front-end device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
Based on the same concept, embodiments of the present invention further provide a non-transitory computer-readable storage medium storing a computer program, where the computer program includes at least one code segment executable by a master device to control the master device to implement the steps of the tr069 protocol-based automatic authorization CPE method according to the embodiments. Examples include:
an automatic configuration server ACS receives a first secret key generated by a client front-end device according to a preset secret key generation method and device identification information;
the ACS acquires the equipment identification information from the first secret key and generates a second secret key according to the preset secret key generation method and the equipment identification information;
and if the character strings of the first secret key and the second secret key are consistent, allowing the customer premises equipment to access.
Based on the same technical concept, the embodiment of the present application further provides a computer program, which is used to implement the above method embodiment when the computer program is executed by the main control device.
The program may be stored in whole or in part on a storage medium packaged with the processor, or in part or in whole on a memory not packaged with the processor.
Based on the same technical concept, the embodiment of the present application further provides a processor, and the processor is configured to implement the above method embodiment. The processor may be a chip.
In summary, according to the method and system for automatically authorizing the CPE based on the tr069 protocol, the automatic configuration server authorizes the access of the customer premises equipment in the above manner, so that on one hand, the danger of stealing the user name and the password can be prevented. And the security of KEY is improved by adding the SN serial number encryption mode and the suffix. By comparing the KEY authorization mode, the method is quick and efficient, and the efficiency of accessing large-scale customer premises equipment is remarkably improved.
The embodiments of the present invention can be arbitrarily combined to achieve different technical effects.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the procedures or functions described in accordance with the present application are generated, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid state disk), among others.
Finally, it should be noted that: the above examples are only intended to illustrate the technical solution of the present invention, but not to limit it; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; and such modifications or substitutions do not depart from the spirit and scope of the corresponding technical solutions of the embodiments of the present invention.

Claims (10)

1. An automatic authorization CPE method based on tr069 protocol is applied to an automatic configuration server ACS, and is characterized by comprising the following steps:
an automatic configuration server ACS receives a first secret key generated by a client front-end device according to a preset secret key generation method and device identification information;
the ACS acquires the equipment identification information from the first secret key and generates a second secret key according to the preset secret key generation method and the equipment identification information;
and if the character strings of the first secret key and the second secret key are consistent, allowing the customer premises equipment to access.
2. The tr069 protocol-based automatic authorization CPE method of claim 1, wherein the device identification information is a product Serial Number (SN) of the customer premises equipment.
3. The tr069 protocol-based automatic authorization CPE method according to claim 2, wherein the preset key generation method comprises:
reinforcing a fixed suffix onu _ SN _ itml of the product serial number SN to form a to-be-encrypted character string of SN + onu _ SN _ itml;
and encrypting the character string to be encrypted according to a base64 encoding algorithm and an md5 information digest algorithm.
4. The tr069 protocol-based automatic authorization CPE method according to claim 1, wherein the ACS receives, in an info message manner, a first key generated by a customer premises equipment according to a preset key generation method and equipment identification information.
5. The tr069 protocol-based automatic authorization CPE method of claim 1, further comprising:
and if the character strings of the first secret key and the second secret key are not consistent, allowing the customer premises equipment to access.
6. An automatic authorization CPE method based on tr069 protocol, which is applied to customer premises equipment, and is characterized by comprising the following steps:
the method comprises the steps that a client front-end device generates a first secret key according to a preset secret key generation method and device identification information, sends the first secret key to an Automatic Configuration Server (ACS) so that the ACS can obtain the device identification information from the first secret key, and generates a second secret key according to the preset secret key generation method and the device identification information;
and the client front-end equipment acquires the access authority when the ACS judges that the character strings of the first secret key and the second secret key are consistent.
7. The tr069 protocol-based automatic authorization CPE method according to claim 6, wherein the device identification information is a product serial number SN of the customer premises equipment, and the preset key generation method includes:
reinforcing a fixed suffix onu _ SN _ itml of the product serial number SN to form a to-be-encrypted character string of SN + onu _ SN _ itml;
and encrypting the character string to be encrypted according to a base64 encoding algorithm and an md5 information digest algorithm.
8. An automatic authorization CPE system based on tr069 protocol, which is applied to an automatic configuration server ACS, and is characterized by comprising:
the receiving module is used for receiving a first secret key generated by the client front-end equipment according to a preset secret key generation method and equipment identification information by the automatic configuration server ACS;
the ACS acquires the equipment identification information from the first secret key and generates a second secret key according to the preset secret key generation method and the equipment identification information;
and the authorization module is used for allowing the customer premise equipment to access if the character strings of the first secret key and the second secret key are consistent.
9. A terminal/electronic device/server, comprising:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the steps of the tr069 protocol based automatic authorization CPE method of any one of claims 1 to 5 or claims 6 to 7.
10. A computer-readable storage medium storing a computer program, wherein the computer program, when executed by a processor, performs the steps of the tr069 protocol-based automatic authorization CPE method according to one of claims 1 to 5 or according to one of claims 6 to 7.
CN202011417745.XA 2020-12-07 2020-12-07 Tr069 protocol-based automatic authorization CPE method and system Active CN112600811B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011417745.XA CN112600811B (en) 2020-12-07 2020-12-07 Tr069 protocol-based automatic authorization CPE method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011417745.XA CN112600811B (en) 2020-12-07 2020-12-07 Tr069 protocol-based automatic authorization CPE method and system

Publications (2)

Publication Number Publication Date
CN112600811A true CN112600811A (en) 2021-04-02
CN112600811B CN112600811B (en) 2021-11-02

Family

ID=75188610

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011417745.XA Active CN112600811B (en) 2020-12-07 2020-12-07 Tr069 protocol-based automatic authorization CPE method and system

Country Status (1)

Country Link
CN (1) CN112600811B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114462104A (en) * 2021-12-30 2022-05-10 苏州浪潮智能科技有限公司 Method and device for confirming customer SN (service number) and computer readable storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064714A (en) * 2006-04-24 2007-10-31 华为技术有限公司 Service dispensing method
CN102045718A (en) * 2009-10-23 2011-05-04 中国移动通信集团福建有限公司 Authentication method and system
US20130114617A1 (en) * 2010-06-30 2013-05-09 Jan Michelsens Method for communicating between customer device and server device
CN104243206A (en) * 2014-09-03 2014-12-24 烽火通信科技股份有限公司 System and method for realizing centralized configuration and management of ONU wireless functions
US20170195372A1 (en) * 2015-12-30 2017-07-06 Reliance Jio Infocomm Limited Systems and methods of providing multimedia service to a legacy device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101064714A (en) * 2006-04-24 2007-10-31 华为技术有限公司 Service dispensing method
CN102045718A (en) * 2009-10-23 2011-05-04 中国移动通信集团福建有限公司 Authentication method and system
US20130114617A1 (en) * 2010-06-30 2013-05-09 Jan Michelsens Method for communicating between customer device and server device
CN104243206A (en) * 2014-09-03 2014-12-24 烽火通信科技股份有限公司 System and method for realizing centralized configuration and management of ONU wireless functions
US20170195372A1 (en) * 2015-12-30 2017-07-06 Reliance Jio Infocomm Limited Systems and methods of providing multimedia service to a legacy device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
李志华等: "IPTV终端网管鉴权系统的设计与实现", 《电视技术》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114462104A (en) * 2021-12-30 2022-05-10 苏州浪潮智能科技有限公司 Method and device for confirming customer SN (service number) and computer readable storage medium
CN114462104B (en) * 2021-12-30 2023-11-14 苏州浪潮智能科技有限公司 Client SN confirmation method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN112600811B (en) 2021-11-02

Similar Documents

Publication Publication Date Title
CN107222476B (en) A kind of authentication service method
CN100512201C (en) Method for dealing inserted-requested message of business in groups
CN106453361B (en) A kind of security protection method and system of the network information
JP7421771B2 (en) Methods, application servers, IOT devices and media for implementing IOT services
US8645693B2 (en) Zero-knowledge based authentication method, system, and apparatus
US8375454B2 (en) Method for locking an application program
KR101753859B1 (en) Server and method for managing smart home environment thereby, method for joining smart home environment and method for connecting communication session with smart device
CN109756446B (en) Access method and system for vehicle-mounted equipment
CN102378170A (en) Method, device and system of authentication and service calling
US20080133914A1 (en) Authentication cache and authentication on demand in a distributed network environment
CN112989426B (en) Authorization authentication method and device, and resource access token acquisition method
CN112910867B (en) Double verification method for trusted equipment to access application
CN113221093B (en) Single sign-on system, method, equipment and product based on block chain
CN115473655B (en) Terminal authentication method, device and storage medium for access network
JP2005167412A (en) Communication system, communication terminal and server apparatus used in communication system, and connection authentication method used for communication system
CN101640685A (en) Method and system for delivering private attribute information
CN112600811B (en) Tr069 protocol-based automatic authorization CPE method and system
CN103139163A (en) Data access method, server and terminal
CN109302442B (en) Data storage proving method and related equipment
WO2021170049A1 (en) Method and apparatus for recording access behavior
CN111563980B (en) Bluetooth lock key generation and authentication method
CN101588237A (en) Method, device and system for encrypting terminal communication based on active network technology
CN111489462A (en) Personal Bluetooth key system
CN112637169B (en) Passive NFC cloud lock encryption method
CN114501591A (en) Intelligent equipment network access method and device and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant